{"title":"基于jxta的信息共享系统的安全管理层","authors":"Yasseen Al Makady, H. Janicke","doi":"10.1109/MCIT.2010.5444862","DOIUrl":null,"url":null,"abstract":"Information is becoming more and more critical to our businesses, governance and social life. Social networking and increasingly pervasive communication technologies lead to a variety of technologies to control and facilitate the exchange of information, many of them based on peer-to-peer concepts. Security issues, such as confidentiality and integrity, arising from the rapid increase of the information exchange are often secondary and not sufficiently addressed by the available technologies. In this paper we will use JXTA, a technology that facilitates communication, resource sharing and distribution amongst peers, to build an information management layer that focuses on the efficient and secure exchange of information.","PeriodicalId":285648,"journal":{"name":"2010 International Conference on Multimedia Computing and Information Technology (MCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Secure management layer for JXTA-based information sharing systems\",\"authors\":\"Yasseen Al Makady, H. Janicke\",\"doi\":\"10.1109/MCIT.2010.5444862\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Information is becoming more and more critical to our businesses, governance and social life. Social networking and increasingly pervasive communication technologies lead to a variety of technologies to control and facilitate the exchange of information, many of them based on peer-to-peer concepts. Security issues, such as confidentiality and integrity, arising from the rapid increase of the information exchange are often secondary and not sufficiently addressed by the available technologies. In this paper we will use JXTA, a technology that facilitates communication, resource sharing and distribution amongst peers, to build an information management layer that focuses on the efficient and secure exchange of information.\",\"PeriodicalId\":285648,\"journal\":{\"name\":\"2010 International Conference on Multimedia Computing and Information Technology (MCIT)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-03-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 International Conference on Multimedia Computing and Information Technology (MCIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MCIT.2010.5444862\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Multimedia Computing and Information Technology (MCIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MCIT.2010.5444862","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secure management layer for JXTA-based information sharing systems
Information is becoming more and more critical to our businesses, governance and social life. Social networking and increasingly pervasive communication technologies lead to a variety of technologies to control and facilitate the exchange of information, many of them based on peer-to-peer concepts. Security issues, such as confidentiality and integrity, arising from the rapid increase of the information exchange are often secondary and not sufficiently addressed by the available technologies. In this paper we will use JXTA, a technology that facilitates communication, resource sharing and distribution amongst peers, to build an information management layer that focuses on the efficient and secure exchange of information.